A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
The purpose of the CEH credential is to establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures, to inform the public that credentialed individuals meet or exceed the minimum standards and reinforce ethical hacking as a unique and self-regulating profession.Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, IoT and OT attacks, cloud computing, pentesting fundamentals, and more.
This course provides hands-on practical experience to learners thus giving them the skills necessary for a future in cybersecurity.
EHE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction.
A PC/Laptop with an Internet Connection.
Module 1 – Information Security Fundamentals
Module 2 – Ethical Hacking Fundamentals
Module 3 – Information Security Threats and Vulnerability Assessment
Module 4 – Password Cracking Techniques and Countermeasures
Module 5 – Social Engineering Techniques and Countermeasures
Module 6 – Network Level Attacks and Countermeasures
Module 7 – Web Application Attacks and Countermeasures
Module 8 – Wireless Attacks and Countermeasures
Module 9 – Mobile Attacks and Countermeasures Module 10 – IOT & OT Attacks and Countermeasures
Module 11 – Cloud Computing Threats and Countermeasures
Module 12 – Penetration Testing Fundamentals